Seqrite Endpoint Protection

This solution provides state-of-the-art defense for your network and connected devices against today’s advanced cyber threats. It encompasses a collection of tools and practices designed to detect, prevent, and respond to malicious activities targeting endpoints. Equipped with cutting-edge features like detection scans and asset management, Seqrite Endpoint Protection ensures holistic security for enterprises’ digital assets.

REQUEST A DEMODatasheet Watch Video

Powered by

GoDeep.AI

Buy Now

Seqrite EPP
  
Buy Now

Key Benefits of Seqrite Endpoint Protection

Endpoint Threat Hunting

Endpoint Detection and Response (EDR) identifies and mitigates potential threats and proactively assists in reporting such incidents following compliance standards.

Comprehensive endpoint and data protection

End-to-end endpoint and data protection integrated into a single solution offer comprehensive security for businesses of any scale.

Higher scalability and enhanced security

Provides increased scalability and heightened security across Windows and Mac platforms, with added support for Linux-based systems.

Patch management

Enhances productivity and security measures with a streamlined and centralized approach to patch management.

Enhanced device control

Improved device control functionalities decrease business security risks.

Competitive security enhancements

Advanced security improvements fulfill enterprise compliance requirements.

Advanced endpoint protection

Robust antivirus, intrusion detection, firewall, and more ensure thorough endpoint protection.

Proactive scanning

Identifies unforeseen vulnerabilities and minimizes unauthorized installations with proactive scans on installed applications.

Uninterrupted protection

Protects from malicious websites, phishing attacks, and other threats.

Cloud-based access

Cloud-based access to the dashboard for imposing policies and compliance.

Connected Endpoint

Consistent asset regulation via comprehensive insights into each connected endpoint.

Features of Seqrite Endpoint Protection

Multi-Site Management

Multi-Site Management

Enhances overall network control and efficiency with High Availability and Hierarchical Multi-Server Deployment, consolidating control over dispersed locations. Flexible Policy Management from the Control Center maintains consistency across endpoints, while Single Sign-On (SSO) simplifies server navigation. Centralized License Management streamlines operations by efficiently allocating and managing licenses across sites.

Application Control Safelist/Blocklist

Application Control Safelist/Blocklist

Enforces application access restrictions following the Zero Trust methodology. Enables customization of application permissions according to the Operating System, including default OS and Seqrite applications. Provides a "Monitoring Only" mode to log application access for administrative review without blocking it.

Google and YouTube Access Controller

Google and YouTube Access Controller

Restricts personal Google access while permitting corporate access based on administrator-selected account domains. Filters YouTube videos based on content categories, publisher names, and other criteria.

Endpoint Threat Hunting

Enterprise File Search (EFS)

EFS is an effective way to find files that match malicious hashes across your endpoints. Based on the hashes provided by a user, EFS detects hidden attacks and helps hunt them down before they harm the system.

Automated IoC Search

Automated IoC Search

Integrates with MISP server for Threat Feeds and searches MISP File Hashes periodically; the findings are published in reports.

Real-time IoC Blocking

Real-time IoC Blocking

Submit file hashes for ongoing investigation of malicious content and real-time blocking.

Migration from v7.6

Migration from v7.6

Enables smooth endpoints, users, groups, and policies migration to the new Endpoint Protection Server configuration. Additionally, it supports migration in batches or groups of endpoints for added convenience.

Rapid Query to Endpoint

Rapid Query to Endpoint

Retrieves endpoints in real-time to collect information from predefined data sources on the endpoints.

File Sandboxing

File Sandboxing

Integrates with Seqrite Cloud Sandbox to analyze suspicious files for malware without any additional tool for Malware Analysis.

High Availability (HA)

High Availability (HA)

High Availability guarantees continuous user access to services, applications, and data, even in the event of hardware failures and software glitches, thereby reducing system downtime.

Ransomware Protection

Ransomware Protection

Utilizes Seqrite's behavior-based detection technology to identify and prevent ransomware threats and backs up data in a protected location, enabling file restoration in the event of a ransomware attack.

Advanced Device Control
Advanced Device Control

Establishes device policies tailored to different device types on Windows and Mac platforms, ensuring network protection against unauthorized devices.

Web Filtering
Web Filtering

Limits web access for employees by blocking Websites individually or as per categories.

Asset Management
Asset Management

Continuously monitors hardware and software configurations of every endpoint, enabling administrators to promptly detect and respond to changes within the company's systems.

Vulnerability Scan
Vulnerability Scan

Scans for known vulnerabilities in applications and operating systems allow users to update essential security patches promptly.

Patch Management
Patch Management

A centralized patch management solution addresses all Microsoft application vulnerability patching requirements.

Data Loss Prevention
Data Loss Prevention

Prevents financial losses by protecting confidential data and mitigating the risk of business secrets leakage. Enables scanning of data-at-rest on endpoints and removable devices.

File Activity Monitor
File Activity Monitor

Meticulously oversees confidential company files, promptly alerting administrators to any copying, renaming, or deleting of such files.

IDS / IPS Protection
IDS / IPS Protection

Proactively identifies and thwarts malicious activities exploiting application vulnerabilities.

Group Policy Management
Group Policy Management

Helps Administrators meticulously define user groups based on organizational hierarchy and establish adaptable policies tailored to situational requirements.

Spam Protection
Spam Protection

Diligently scans endpoint inboxes for spam, phishing attacks, and unsolicited emails, bolstering defenses against email-borne threats.

Third-party Antivirus Removal
Third-party Antivirus Removal

If another antivirus solution is detected during the Endpoint Protection client installation, its uninstaller will be activated or automatically removed. The installation of Seqrite EPP will not proceed until the previously installed antivirus is eliminated from the system.

Browsing Protection
Browsing Protection

Safeguards endpoint clients against attacks from malicious websites accessed within the network, fortifying defenses against web-based threats.

Phishing Protection
Phishing Protection

Prevents phishing attacks originating from malicious codes over the Internet from infiltrating the network and spreading.

Firewall Protection
Firewall Protection

Monitors inbound and outbound network traffic, allowing or disallowing applications based on defined rules, enhancing network security.

Tuneup
Tuneup

Enhances endpoint performance by cleaning junk files and deleting invalid registry/disk entries within the network, optimizing system efficiency.

Multiple Update Managers
Multiple Update Managers

Helps deploy multiple update managers to achieve load balancing and prevent network congestion, ensuring seamless distribution of updates.

Roaming Platform
Roaming Platform

The cloud-based solution enables continuous endpoint management, even outside the network, allowing administrators to maintain oversight, apply policies, and ensure compliance.

Email and SMS Notifications
Email and SMS Notifications

Preconfigured notifications about critical network events reach appropriate parties via email or text, ensuring timely response to potential security incidents.

Compare Seqrite Endpoint Protection Products

FeaturesSMEBusinessTotalEnterprise SuiteEDR
All Core Protection
(Antivirus, IDS/IPS Protection, Email Protection, Phishing Protection, Browsing Protection, SMS Notification*, Vulnerability Scan, Roaming Platform)
         
Anti Ransomware          
Firewall Protection          
GoDeep.AI*          
Multi-Site Management          
Asset Management          
Spam Protection          
Web Filtering          
Advanced Device Control          
SIEM Integration          
Application Control - Blocklist          
Application Control - Safelist          
File Activity Monitoring          
Tuneup*          
Patch Management          
YouTube Access Controller          
Google Access Controller          
Disk Encryption Management          
Rapid Query to Endpoints          
Automated IoC Search          
Realtime IoC Search          
Enterprise File Search (EFS)          
Data Loss Prevention   ADD-ON ADD-ON    
File Sandboxing   ADD-ON ADD-ON ADD-ON ADD-ON

Buy Now

  
Buy Now Buy Now Buy Now Buy Now

NA

Enquire Now

NA

Enquire Now

NA

Enquire Now

Note:

  • * Feature(s) included only in v7.6

System Requirement

  • v8.x
  • v7.x
Seqrite Endpoint Protection Standalone Setup
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 150 GBs or above
  • Available RAM: 8 GBs or above
  • Processer: 4 Core (x86-64), 2.60GHz or above
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 250 GBs or above
  • Available RAM: 16 GBs or above
  • Processer: 8 Core (x86-64), 2.60GHz or above
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 350 GBs or above
  • Available RAM: 24 GBs or above
  • Processer: 12 Core(x86-64), 2.60GHz or above
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 450 GBs or above
  • Available RAM: 32 GBs or above
  • Processer: 16 Core(x86-64),2.60GHz or above
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 500 GBs or above
  • Available RAM: 48 GBs or above
  • Processer: 24 Core(x86-64),2.60GHz or above
Seqrite Endpoint Protection Distributed Setup
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 250 GBs or above
  • Available RAM: 16 GBs or above
  • Processer: 8 Core (x86-64), 2.60GHz or above
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 350 GBs or above
  • Available RAM: 16 GBs or above
  • Processer: 12 Core(x86-64), 2.60GHz or above
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 350 GBs or above
  • Available RAM: 24 GBs or above
  • Processer: 12 Core(x86-64),2.60GHz or above
Seqrite Endpoint Protection Multisite Setup
  • Ubuntu 22.04 (supported on server as well as desktop image)
  • Available Disk Space: 250 GBs or above
  • Available RAM: 16 GBs or above
  • Processer: 8 Core (x86-64), 2.60GHz or above

Note: Site Server Configuration will be similar to the Standalone recommendation

System requirements for Seqrite Endpoint Protection clients

Important to Know:

  • SEPS client can not be installed on Windows 7 and Microsoft Windows Server 2008 R2 if these updates are not installed: Install them by clicking on the link OR
    Install Internet Explorer 11 to get the updates automatically. After installing the KB articles, you need to restart the system.
  • For Windows 2016, Windows Server 2019 and Server 2022, you need to uninstall Windows Defender. Post the uninstallation, make sure that you restart the system.
  • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Microsoft Windows 7 Home Basic/ Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
  • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 - Bit)
  • Microsoft Windows 11
  • Microsoft Windows Server 2016
  • Microsoft Windows Server 2019 (64-bit)
  • Windows 10 November 2019 Update
  • Microsoft Windows Server 2022 Standard / Datacenter / Essentials
  • Processor: Intel core or Apple’s M1, M2, M3 chip compatible
  • Mac OS X 10.12, 10.13, 10.14, 10.15, 11, 12, 13, 14 and 15
  • GNU C Library 2.5 and later
  • SAMBA version 4.12 and earlier
  • Supported Distributions for Seqrite Endpoint Protection client:
    • Debian 9, 10
    • Ubuntu 14.04,16.04
    • Boss 6.0
    • Linux Mint 19.3
  • GNU C Library 2.5 and later
  • SAMBA version 4.16 and earlier
  • Supported Distributions for Seqrite Endpoint Protection client:
    • Fedora 30, 32
    • Linux Mint 19.3, 20, 21.3
    • Ubuntu 16.04, 18.04, 20.4, 22.04
    • Debian 9, 10
    • CentOS 7.8, 8.2
    • RHEL 7.5, 7.8, 8.2 & 8.6 Enterprise, 9.0, 9.1, 9.2, 9.3
    • SUSE Linux 12. SP4 / Enterprise Desktop 15
    • Rocky Linux 8.4
    • Boss 6.0, 8.0, 9.0
    • Oracle Linux 7.1, 7.9 and 8.1
Windows
  • Processor:
    • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor
    • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor
  • RAM:
    • Minimum: 1 GB
    • Recommended: 2 GB free RAM
  • Hard disk space:
    • 3200 MB free space
  • Web Browser:
    • Internet Explorer 7 or later
  • Network protocol:
    • TLS 1.2
MAC
  • Processor:
    • Processor: Intel core or Apple’s M1, M2, M3 chip compatible
  • RAM:
    • Minimum: 512 MB
    • Recommended: 2 GB free RAM
  • Hard disk space:
    • 1200 MB free space
Linux
  • Processor:
    • Intel or compatible
  • RAM:
    • Minimum: 512 MB
    • Recommended: 1 GB free RAM
  • Hard disk space:
    • 1200 MB free space
System requirements for Patch Management server
  • OS:
    • Microsoft Windows 10 (64-bit) and above
    • Microsoft Windows Server 2012 (64-bit) and above
  • Disk Space:
    • Minimum: 40 GB
    • Recommended: 1 TB
  • RAM:
    • 8 GBs or above
  • Processer:
    • 4 Core(x86-64), 2.60GHz or above

Note:

  • For more than 25 clients, Seqrite recommends installing Patch Management server on the Windows Server operating system.
System requirements for deployment of Seqrite Endpoint Protection server via OVA file
  • Physical Windows Machine with RAM >= 16 GB
  • Windows 10 and above OR Windows server 2019 and above
  • Disk space: 60 GB and above.
  • CPU: 4 Core (x86-64) or above
  • The VT-x must be enabled in the physical machine’s BIOS
  • Oracle Virtual Box 7.0.8
  • EPP_8.2_UBUNTU22.ova build file.
  • Keep the following details ready and handy
    • Product Key
    • Static IP Address
    • Gateway
    • Subnet mask
    • DNS

Note:

System requirements for Seqrite Endpoint Protection server
  • Microsoft Windows 11
  • Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 -Bit)
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 7 Home Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows Vista Home Premium / Business / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows XP 32-bit SP3, 64-bit SP1 and SP2 / Professional Edition (32-bit / 64-bit)
  • Microsoft Windows Server 2022 Standard / Datacenter / Essentials
  • Microsoft Windows Server 2019 Standard / Datacenter / Essentials
  • Microsoft Windows Server 2016 Standard / Datacenter (64-bit)
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
  • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
  • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
  • Microsoft Windows Server 2003 R2 Web / Standard / Enterprise /Datacenter
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)

Note: The following operating systems support only Master Servers without any Secondary Server,

  • Microsoft Windows XP 64-bit SP1 and SP2 / Professional Edition (64-bit)
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (64-bit)

The computer where Seqrite Endpoint Protection server is to be installed must meet the following requirements.

  • Processor:
    • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium
    • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) Intel Pentium or higher
  • RAM:
    • Minimum: 2 GB
    • Recommended: 4 GB or more
      Seqrite Endpoint Protection server may require additional RAM as per the requirements of installed applications.
  • Hard disk space:
    • Minimum: 4800 MB free disk space
    • Recommended: 10000 MB free disk space
  • Web Browser:
    • Internet Explorer 10 or 11
    • Google Chrome 62, 63, 64 or 65
    • Mozilla Firefox 56, 57, 58, 59, 62, 64 or 65
  • Display
    • 1024 x 768

Note:

  • For more than 25 clients, Seqrite recommends installing Seqrite Endpoint Protection Server and Patch Management server on the Windows Server operating system

  • For more than 500 clients, Seqrite recommends a dedicated Web server (IIS).

  • Seqrite recommends deploying a separate/dedicated Alternate Update manager for a group of up to 200 clients for proper load balancing.

Java Runtime Environment (JRE) required to perform installation through Web page and Add Device functionalities are as follows:

  • 32-bit
    • 32-bit JRE 7, 32-bit JRE 8
  • 64-bit
    • 32-bit JRE 7, 32-bit JRE 8
    • 64-bit JRE 7, 64-bit JRE 8

Seqrite Endpoint Protection server needs to have Microsoft IIS Web server as well as Microsoft .NET Framework 4.0 on your computer system.

  • IIS Version 10 on Windows 10
  • IIS Version 8.5 on Windows 8.1 and Windows Server 2012 R2
  • IIS Version 8.0 on Windows 8 and Windows Server 2012
  • IIS Version 7.6 on Windows 7 and Windows Server 2008 R2
  • IIS Version 7.0 on Windows Vista and Windows Server 2008
  • IIS Version 6.0 on Windows Server 2003
  • IIS Version 5.1 on Windows XP SP3

Note: The Seqrite Endpoint Protection installer will install required IIS Components.

System requirements for Seqrite Endpoint Protection clients

Seqrite Endpoint Protection client can be installed on a computer system with any one of the following operating systems:

  • Microsoft Windows 11
  • Microsoft Windows 10 Home / Pro / Enterprise / Education (32-Bit / 64 -Bit)
  • Microsoft Windows 8.1 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 8 Professional / Enterprise (32-bit/64-bit)
  • Microsoft Windows 7 Home Basic/ Premium / Professional / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows Vista Home Basic/ Premium / Business / Enterprise / Ultimate (32-bit/64-bit)
  • Microsoft Windows XP Home (32-bit) / Professional Edition (32-bit / 64-bit)
  • Microsoft Windows Server 2022 Standard / Datacenter / Essentials
  • Microsoft Windows Server 2019 Standard / Datacenter / Essentials
  • Microsoft Windows Server 2016 Standard / Datacenter (64-bit)
  • Microsoft Windows Server 2012 R2 Standard / Datacenter (64-bit)
  • Microsoft Windows MultiPoint Server 2012 Standard (64-bit)
  • Microsoft Windows Server 2012 Standard / Essentials / Foundation / Storage Server / Datacenter (64-bit)
  • Microsoft Windows SBS 2011 Standard / Essentials
  • Microsoft Windows 2008 Server R2 Web / Standard / Enterprise / Datacenter (64-bit)
  • Microsoft Windows 2008 Server Web / Standard / Enterprise (32-bit/64-bit) / Datacenter (64-bit)
  • Microsoft Windows Server 2003 R2 Web / Standard / Enterprise /Datacenter
  • Microsoft Windows Server 2003 Web / Standard / Enterprise (32-bit/64-bit)

Note:

  • For Windows 2016 Server and Windows 2019 Server, uninstall Windows Defender before installing Seqrite Endpoint Protection client.
  • If you are upgrading the Seqrite Endpoint Protection client to Windows 2016 Server or Windows 2019 Server, uninstall Windows Defender after upgrade.

The computer where Seqrite Endpoint Protection client is to be installed must meet the following requirements.

  • Processor:
    • Minimum: 1 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista
    • Recommended: 2 GHz 32-bit (x86) or 64-bit (x64) processor for Windows Vista or higher
  • RAM:
    • Minimum: 1 GB
    • Recommended: 2 GB or more
  • Hard disk space:
    • 3200 MB
  • Web Browser:
    • Internet Explorer 5.5 or later

Software and hardware requirements for Seqrite Endpoint Protection clients on Mac OS are as follows.

  • MAC OS:
    • Mac OS X 10.12, 10.13, 10.14, 10.15, 11, 12, 13, 14 and 15
  • Processor:
    • Intel core or Apple’s M1, M2, M3 chip compatible
  • RAM:
    • Minimum: 512 MB
    • Recommended: 2 GB or more
  • Hard disk space:
    • 1200 MB

Software and hardware requirements for Seqrite Endpoint Protection clients on Linux OS are as follows:

  • 32-bit:
    • RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9
    • BOSS 6
    • Fedora 14, 18, 19, 20, 21, 22, 23, 24, 25
    • openSUSE 11.4, 12.2, 12.3, 13.2, 42.2
    • Linux Mint 13, 14, 15, 16, 17.3, 18
    • Ubuntu 10.10, 11.4, 12.04 LTS, 12.04.3 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.04 LTS, 16.10, 17.04
    • CentOS 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9
  • 64-bit:
    • RHEL 6.1, 6.2, 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.1, 7.2, 7.3
    • Boss: 7.0, 8.0
    • Fedora 14, 18, 19, 20, 21, 22, 23, 24, 25
    • openSUSE 11.4, 12.2, 12.3, 42.3
    • Linux Mint 13, 14, 15, 16, 17.3, 18
    • Ubuntu 10.10, 11.4, 12.04.2 LTS, 13.04, 13.10, 14.04, 14.10, 15.04, 16.04 LTS, 16.10, 17.04, 17.10, 18.04, 20.04 LTS
    • CentOS 6.3, 6.4, 6.5, 6.6, 6.7, 6.8, 6.9, 7.0, 7.4, 8.0, 8.1
    • SUSE Linux 11.00, 12.00, 12.2
  • Processor:
    • Intel core compatible
  • RAM:
    • Minimum: 512 MB
    • Recommended: 1 GB or more
  • Hard disk space:
    • 1200 MB

The Seqrite Endpoint Protection client supports the above-mentioned distribution. The clients also support the other versions if the following prerequisites are met,

  • GNU C Library 2.11 and above

  • SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.

  • GNU C Library 2.5 and above

  • SAMBA version 3.5.x to 4.5.x, 4.10.x, 4.11.x.

In case of the clients with other than above mentioned Linux operating system, Seqrite recommends to validate the clients in a non-production environment before deploying in the production environment.

Request for Demo
Request for Demo

Experience the best-in-class solutions offered by Seqrite and how they can address the security challenges of your enterprise. Explore our key features and capabilities with a demo.

Request a Demo
Ask an Expert
Ask an Expert

Our experts are available 24 by 7 to answer any query you may have. From basic questions like, “what is endpoint protection,” to advanced questions on its features and applications, they will help you with everything.

Contact Now